[Their role also consists in watching over recruitment to a] network and ensuring the loyalty of recruits through a variety of procedural promises and hidden pressure directed against new members and their families. Guardians pursue to avoid defections from the network actors and to reduce losses when defections occur.

5) Extenders extend the network by recruiting new members and
also by negotiating association with other networks and
encouraging association with the business sector, government and
justice. Various strategies are used to this end. They range from
unpaid recruitment through corruption and bribery to involuntary
recruitment through pressure, infrequently supported by
encouragements and prizes.

6) Monitors are devoted to the network’s usefulness their tasks
consist in providing information to organizers regarding flaws and
hitches within the network so that the organizers can decide them.
Monitors guarantee that the network is able to correct to new
situations and keep the high degree of elasticity that is essential to
avoid law enforcement.

7) Crossovers are part of a terrorist network, but continue to work
in legal institutions, whether governmental, financial or commercial.
As such, these individuals provide vital evidence and contribute to
the guard of a network.

Their role also consists in watching over recruitment to the network and ensuring the loyalty of recruits through a variety of ritual oaths and latent coercion directed against new members and their families. Guardians seek to prevent defections from the network actors and to minimize damages when defections occur.

5) Extenders extend the network by recruiting new members and also by negotiating
collaboration with other networks and encouraging collaboration with the business
sector, government and justice. Various tactics are used to this end. They range from
voluntary recruitment through bribery and corruption to involuntary recruitment through
coercion, occasionally supported by incentives and rewards.

6) Monitors are dedicated to the network’s effectiveness their responsibilities consist
in providing information to organizers regarding weaknesses and problems within the
network so that the organizers can resolve them. Monitors ensure that the network is
able to adjust to new circumstances and maintain the high degree of flexibility that is
necessary to circumvent law enforcement.

7) Crossovers are part of a criminal network, but continue to work in legal institutions,
whether governmental, financial or commercial. As such, these individuals provide
invaluable information and contribute to the protection of the network.

Investigative data mining can also be used to understand the psychological effects of terrorism. One of the main effects of terrorism is fear, which is spread through network structures such as media, the Internet, and personal relationships. For example, the number of ties an individual has to victims of terrorism may impact the individual’s perception of the risk of terrorism.

It is believed to see further research on network structure evolution. It would be interesting to compare structures of multiple terrorist [networks to see how they evolve over time.]

[p. 7]

Network analysis can also be used to understand the psychological effect of terrorism. One of the main effects of terrorism is fear, which is spread through network

[p.8]

structures such as media, the Internet, and personal relationships. For example, the number of ties an individual has to victims of terrorism may impact the individual’s perception of the risk of terrorism. Finally, I would like to see further research on network structure evolution. It would be interesting to compare the structure of multiple terrorist networks to see how they evolve over time.

Anmerkungen

On the final stretch of Nm's thesis one can find a large portion of somebody else's final thoughts on the subject.